Sciweavers

948 search results - page 11 / 190
» Attacking cryptographic schemes based on
Sort
View
127
Voted
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
133
Voted
MYCRYPT
2005
Springer
248views Cryptology» more  MYCRYPT 2005»
15 years 7 months ago
A Family of Fast Syndrome Based Cryptographic Hash Functions
Recently, some collisions have been exposed for a variety of cryptographic hash functions [20,21] including some of the most widely used today. Many other hash functions using simi...
Daniel Augot, Matthieu Finiasz, Nicolas Sendrier
WASA
2009
Springer
231views Algorithms» more  WASA 2009»
15 years 8 months ago
A Consistency-Based Secure Localization Scheme against Wormhole Attacks in WSNs
Wormhole attacks can negatively affect the localization in wireless sensor networks. A typical wormhole attack can be launched by two colluding external attackers, one of which sni...
Honglong Chen, Wei Lou, Zhi Wang
IJNSEC
2007
131views more  IJNSEC 2007»
15 years 1 months ago
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Debasis Giri, Parmeshwary Dayal Srivastava
106
Voted
EUC
2007
Springer
15 years 5 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...